I. Introduction
Due to the natural vulnerability of electromagnetic (EM) waves and to ensure secure transmissions, many studies focus on exploiting physical layer security (PLS) techniques, such as cooperative jamming (CJ) [1]. Differently, considering that illegal transmissions could cause the propagation of illegal information or unauthorized occupation of wireless resources, preventing it is necessary. In the military, as adversarial communication is unexpected, self-defense jamming is crucial. In contrast to PLS, by taking advantage of the features of EM waves, we can launch jamming attacks to destroy signals received by a hostile node [2].